170 resultados para Ordinary cokriging


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we consider a time fractional diffusion equation on a finite domain. The equation is obtained from the standard diffusion equation by replacing the first-order time derivative by a fractional derivative (of order $0<\alpha<1$ ). We propose a computationally effective implicit difference approximation to solve the time fractional diffusion equation. Stability and convergence of the method are discussed. We prove that the implicit difference approximation (IDA) is unconditionally stable, and the IDA is convergent with $O(\tau+h^2)$, where $\tau$ and $h$ are time and space steps, respectively. Some numerical examples are presented to show the application of the present technique.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ordinary desktop computers continue to obtain ever more resources – in-creased processing power, memory, network speed and bandwidth – yet these resources spend much of their time underutilised. Cycle stealing frameworks harness these resources so they can be used for high-performance computing. Traditionally cycle stealing systems have used client-server based architectures which place significant limits on their ability to scale and the range of applica-tions they can support. By applying a fully decentralised network model to cycle stealing the limits of centralised models can be overcome. Using decentralised networks in this manner presents some difficulties which have not been encountered in their previous uses. Generally decentralised ap-plications do not require any significant fault tolerance guarantees. High-performance computing on the other hand requires very stringent guarantees to ensure correct results are obtained. Unfortunately mechanisms developed for traditional high-performance computing cannot be simply translated because of their reliance on a reliable storage mechanism. In the highly dynamic world of P2P computing this reliable storage is not available. As part of this research a fault tolerance system has been created which provides considerable reliability without the need for a persistent storage. As well as increased scalability, fully decentralised networks offer the ability for volunteers to communicate directly. This ability provides the possibility of supporting applications whose tasks require direct, message passing style communication. Previous cycle stealing systems have only supported embarrassingly parallel applications and applications with limited forms of communication so a new programming model has been developed which can support this style of communication within a cycle stealing context. In this thesis I present a fully decentralised cycle stealing framework. The framework addresses the problems of providing a reliable fault tolerance sys-tem and supporting direct communication between parallel tasks. The thesis includes a programming model for developing cycle stealing applications with direct inter-process communication and methods for optimising object locality on decentralised networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Although internet chat is a significant aspect of many internet users’ lives, the manner in which participants in quasi-synchronous chat situations orient to issues of social and moral order remains to be studied in depth. The research presented here is therefore at the forefront of a continually developing area of study. This work contributes new insights into how members construct and make accountable the social and moral orders of an adult-oriented Internet Relay Chat (IRC) channel by addressing three questions: (1) What conversational resources do participants use in addressing matters of social and moral order? (2) How are these conversational resources deployed within IRC interaction? and (3) What interactional work is locally accomplished through use of these resources? A survey of the literature reveals considerable research in the field of computer-mediated communication, exploring both asynchronous and quasi-synchronous discussion forums. The research discussed represents a range of communication interests including group and collaborative interaction, the linguistic construction of social identity, and the linguistic features of online interaction. It is suggested that the present research differs from previous studies in three ways: (1) it focuses on the interaction itself, rather than the ways in which the medium affects the interaction; (2) it offers turn-by-turn analysis of interaction in situ; and (3) it discusses membership categories only insofar as they are shown to be relevant by participants through their talk. Through consideration of the literature, the present study is firmly situated within the broader computer-mediated communication field. Ethnomethodology, conversation analysis and membership categorization analysis were adopted as appropriate methodological approaches to explore the research focus on interaction in situ, and in particular to investigate the ways in which participants negotiate and co-construct social and moral orders in the course of their interaction. IRC logs collected from one chat room were analysed using a two-pass method, based on a modification of the approaches proposed by Pomerantz and Fehr (1997) and ten Have (1999). From this detailed examination of the data corpus three interaction topics are identified by means of which participants clearly orient to issues of social and moral order: challenges to rule violations, ‘trolling’ for cybersex, and experiences regarding the 9/11 attacks. Instances of these interactional topics are subjected to fine-grained analysis, to demonstrate the ways in which participants draw upon various interactional resources in their negotiation and construction of channel social and moral orders. While these analytical topics stand alone in individual focus, together they illustrate different instances in which participants’ talk serves to negotiate social and moral orders or collaboratively construct new orders. Building on the work of Vallis (2001), Chapter 5 illustrates three ways that rule violation is initiated as a channel discussion topic: (1) through a visible violation in open channel, (2) through an official warning or sanction by a channel operator regarding the violation, and (3) through a complaint or announcement of a rule violation by a non-channel operator participant. Once the topic has been initiated, it is shown to become available as a topic for others, including the perceived violator. The fine-grained analysis of challenges to rule violations ultimately demonstrates that channel participants orient to the rules as a resource in developing categorizations of both the rule violation and violator. These categorizations are contextual in that they are locally based and understood within specific contexts and practices. Thus, it is shown that compliance with rules and an orientation to rule violations as inappropriate within the social and moral orders of the channel serves two purposes: (1) to orient the speaker as a group member, and (2) to reinforce the social and moral orders of the group. Chapter 6 explores a particular type of rule violation, solicitations for ‘cybersex’ known in IRC parlance as ‘trolling’. In responding to trolling violations participants are demonstrated to use affiliative and aggressive humour, in particular irony, sarcasm and insults. These conversational resources perform solidarity building within the group, positioning non-Troll respondents as compliant group members. This solidarity work is shown to have three outcomes: (1) consensus building, (2) collaborative construction of group membership, and (3) the continued construction and negotiation of existing social and moral orders. Chapter 7, the final data analysis chapter, offers insight into how participants, in discussing the events of 9/11 on the actual day, collaboratively constructed new social and moral orders, while orienting to issues of appropriate and reasonable emotional responses. This analysis demonstrates how participants go about ‘doing being ordinary’ (Sacks, 1992b) in formulating their ‘first thoughts’ (Jefferson, 2004). Through sharing their initial impressions of the event, participants perform support work within the interaction, in essence working to normalize both the event and their initial misinterpretation of it. Normalising as a support work mechanism is also shown in relation to participants constructing the ‘quiet’ following the event as unusual. Normalising is accomplished by reference to the indexical ‘it’ and location formulations, which participants use both to negotiate who can claim to experience the ‘unnatural quiet’ and to identify the extent of the quiet. Through their talk participants upgrade the quiet from something legitimately experienced by one person in a particular place to something that could be experienced ‘anywhere’, moving the phenomenon from local to global provenance. With its methodological design and detailed analysis and findings, this research contributes to existing knowledge in four ways. First, it shows how rules are used by participants as a resource in negotiating and constructing social and moral orders. Second, it demonstrates that irony, sarcasm and insults are three devices of humour which can be used to perform solidarity work and reinforce existing social and moral orders. Third, it demonstrates how new social and moral orders are collaboratively constructed in relation to extraordinary events, which serve to frame the event and evoke reasonable responses for participants. And last, the detailed analysis and findings further support the use of conversation analysis and membership categorization as valuable methods for approaching quasi-synchronous computer-mediated communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this chapter, we frame YouTube as an example of “co-creative” culture – whatever YouTube is, it is produced dynamically (that is, as an ongoing process, over time) as a result of many interconnected instances of participation, by many different people. In order to understand these co-creative relationships, it is important not to focus exclusively on how the “ordinary consumer” or “amateur producer,” are participating in YouTube; rather, we argue it is necessary to include the activities of “traditional media” companies and media professionals, and more importantly, the new models of media entrepreneurialism that are grounded in YouTube’s “grassroots” culture. Hence, this chapter focuses the role that “YouTube stars” – highly visible and successful “homegrown” performers and producers – play in modelling and negotiating these co-creative relationships within the context of YouTube’s social network; and the new models of entrepreneurship within participatory culture that they represent.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Aims – To develop local contemporary coefficients for the Trauma Injury Severity Score in New Zealand, TRISS(NZ), and to evaluate their performance at predicting survival against the original TRISS coefficients. Methods – Retrospective cohort study of adults who sustained a serious traumatic injury, and who survived until presentation at Auckland City, Middlemore, Waikato, or North Shore Hospitals between 2002 and 2006. Coefficients were estimated using ordinary and multilevel mixed-effects logistic regression models. Results – 1735 eligible patients were identified, 1672 (96%) injured from a blunt mechanism and 63 (4%) from a penetrating mechanism. For blunt mechanism trauma, 1250 (75%) were male and average age was 38 years (range: 15-94 years). TRISS information was available for 1565 patients of whom 204 (13%) died. Area under the Receiver Operating Characteristic (ROC) curves was 0.901 (95%CI: 0.879-0.923) for the TRISS(NZ) model and 0.890 (95% CI: 0.866-0.913) for TRISS (P<0.001). Insufficient data were available to determine coefficients for penetrating mechanism TRISS(NZ) models. Conclusions – Both TRISS models accurately predicted survival for blunt mechanism trauma. However, TRISS(NZ) coefficients were statistically superior to TRISS coefficients. A strong case exists for replacing TRISS coefficients in the New Zealand benchmarking software with these updated TRISS(NZ) estimates.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Read through a focus on the remediation of personal photography in the Flickr photosharing website, in this essay I treat vernacular creativity as a field of cultural practice; one that that does not operate inside the institutions or cultural value systems of high culture or the commercial popular media, and yet draws on and is periodically appropriated by these other systems in dynamic and productive ways. Because of its porosity to commercial culture and art practice, this conceptual model of ‘vernacular creativity’ implies a historicised account of ‘ordinary’ or everyday creative practice that accounts for both continuity and change and avoids creating a nostalgic desire for the recuperation of an authentic folk culture. Moving beyond individual creative practice, the essay concludes by considering the unintended consequences of vernacular creativity practiced in online social networks: in particular, the idea of cultural citizenship.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As with the broader field of education research, most writing on the subject of school excursions and field trips has centred around progressive/humanist concerns for building pupil’s self-esteem and for the development of the ‘whole child’. Such research has also stressed the importance of a broad, grounded, and experiential curriculum - as exemplified by subjects containing these extra-school activities - as well as the possibility of strengthening the relationship between student and teacher. Arguing that this approach to the field trip is both exhausted of ideas and conceptually flawed, this paper proposes some alternate routes into the area for the prospective researcher. First, it is argued that by historicising the subject matter, it can be seen that school excursions are not simply the product of the contemporary humanist desire for diverse and fulfilling educational experiences, rather they can, in part, be traced to eighteenth century beliefs among the English gentry that travel formed a crucial component of a good education, to the advent of an affordable public rail system, and to school tours associated with the Temperance movement. Second, field trips can be understood from within the associated framework of concerns over the governance of tourism and the organisation of disciplinary apparatuses for the production of an educated and regulated citizenry. Far from being a simple learning experience, museums and art galleries form part of a complex of disciplinary and power relations designed to produce a populace with very specific capacities, aspirations and styles of public conduct. Finally, rather than allowing children ‘freedom’ from the constraints of the classroom, on the contrary, through the medium of the field-trip, children can become accustomed to having their activities governed in the broader domain of the generalised community . School excursions thereby constitute an effective tactic through which young people have their conduct managed, and their social and scholastic identities shaped and administered.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we consider the numerical solution of a fractional partial differential equation with Riesz space fractional derivatives (FPDE-RSFD) on a finite domain. Two types of FPDE-RSFD are considered: the Riesz fractional diffusion equation (RFDE) and the Riesz fractional advection–dispersion equation (RFADE). The RFDE is obtained from the standard diffusion equation by replacing the second-order space derivative with the Riesz fractional derivative of order αset membership, variant(1,2]. The RFADE is obtained from the standard advection–dispersion equation by replacing the first-order and second-order space derivatives with the Riesz fractional derivatives of order βset membership, variant(0,1) and of order αset membership, variant(1,2], respectively. Firstly, analytic solutions of both the RFDE and RFADE are derived. Secondly, three numerical methods are provided to deal with the Riesz space fractional derivatives, namely, the L1/L2-approximation method, the standard/shifted Grünwald method, and the matrix transform method (MTM). Thirdly, the RFDE and RFADE are transformed into a system of ordinary differential equations, which is then solved by the method of lines. Finally, numerical results are given, which demonstrate the effectiveness and convergence of the three numerical methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Integral attacks are well-known to be effective against byte-based block ciphers. In this document, we outline how to launch integral attacks against bit-based block ciphers. This new type of integral attack traces the propagation of the plaintext structure at bit-level by incorporating bit-pattern based notations. The new notation gives the attacker more details about the properties of a structure of cipher blocks. The main difference from ordinary integral attacks is that we look at the pattern the bits in a specific position in the cipher block has through the structure. The bit-pattern based integral attack is applied to Noekeon, Serpent and present reduced up to 5, 6 and 7 rounds, respectively. This includes the first attacks on Noekeon and present using integral cryptanalysis. All attacks manage to recover the full subkey of the final round.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study addresses the ordinary activities of passengers in airports. Using observational techniques we investigated how passenger activities are mediated by artefacts, in this the bags that people carry. The relationship between passengers and their bags is shown to be complex and contingent on many factors. We report on our early research in the airport and document an emerging taxonomy of passenger activity. The significance of this research is in the contribution made to an understanding of passenger activities which could contribute to the design of future technologies for passenger facilitation and to airport terminal design.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper argues that the increasing visibility of Indigenous families in the mainstream Australian media over the past ten years has produced new opportunities for addressing national injustices of the Stolen Generations. It shows how, as certain celebrities like Ernie Dingo, Nova Peris and Cathy Freeman, have become popular household names, a concurrent public interest in their family backgrounds has grown. Descriptive accounts of relationships and shared histories – propelled by the expansion of the lifestyle television genre in this context – has enabled some stories of the ‘Stolen Generations’ to be seen as ‘ordinary’, and part of a broader sense of everyday Australian life for the first time. With the aid of recent sexual citizenship research, the article illustrates that such middle-class representations give voice to new embodiments of citizenship in the post-apology era, making Indigenous justice more subjectively interconnected with life in the white Australian public sphere.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Bronwyn Fredericks shares her thoughts on citizen advocacy as part of the 1999-2009 celebration of Capricorn Citizen Advocacy Inc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Midwives are involved in a very dynamic profession. As they face their everyday tasks they encounter many different situations and a variety of people which results in a vast number of interactions. This narrative research project sought to identify some of the ‘ordinary’ encounters and interactions that midwives working in a hospital environment experience in their daily work and explore them from an ethical perspective. It found that many ethical decisions have to be made ‘on-the-run’, with no time to contemplate or decide what the best course of action might be. As ethics is embedded within every encounter a midwife has, it is essential that all midwives have an awareness and understanding of their own value systems, professional ethical codes and ethical principles that can act as guides when they have to make choices in these situations, which are frequently challenging.